AOL PiMPS
AOL PiMPS

THEY'RE BACK, AND THEY'RE BETTER THAN EVER! Saturday, October 15, 2005 My goodness, I received an email recently from a long retired pimp from many years ago. The one and only CandyMan sends his regards to all the pimps who continue with the daily struggle of finding some ho's to slap around. Candy of course, being one of the founding fathers of the warez scene,.....
1998
1998

It's 1998 I'm in Sixth grade and I'm 11 years old.  Back then it seemed like time took forever to go by.  As i look back today i realize wow I learned a shit load in 2 years.  Well like I said its 1998 ! and my family finally gets their own computer im almost positive its a Compaq Persario.   AOL was already pretty.....
Prog Password List

Acid Burn: (one of these) PiXY RuLEz You! or upsidedown or03/17/96

Agent Orange Tosser: I Crap On Lamers ivan is a fairymaxuck

Anti-mass mailer: bud is blah

AoAbortion Tos: Fuck TeRRoR, FAC: KK

AoAbortion FAC: KK

AoAkira: GrEEn DaY

AoAsting: BuBBa , Ugh(AsTiGMaX), John(Prez), AsTiG RuLeZ(member)

AoBliss Tosser: Welcome to the wonderful world of Bliss

AoBomer v1 b1 bot scare: YoUsUck

Aobomer v1 b1 tos: Only TOS LamerZ

AoBomer v1 b2: TOS ALL LAMERZ

AoBomer v1 b3: ALL LAMERZ DIE!

The AOL Protocol
The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

AOL Warez Arise Group
AOL Warez Arise Group

2014-10-22 13_29_16-1264410_10105281608895370_5920015541346424548_o - Windows Photo Viewer

http://www.AriseWarez.com

Arise Macro Created by X99

glassyabout_arise

 

About Arise Warez

A long, long, time ago, hehe, I was in a group called DGG. GaL ran the group and eventually I ran it as well. Unfortunately for me I learned the hard way when a person other then yourself controls the site as well as the bots, well you got problems. GaL decided she wasn’t going to be involed with the group anymore and yanked the site. Well Arise was born that day. I borrowed a botnet and got a T-3 release site. First mistake: using a borrowed botnet. Ok so I got a few bots, Second mistake: Never have anybody but yourself be botmaster. Well eventually I learned bots and the group Arise flourished. One small problem was we were an AOL group but had no AOL presence. Chemical came on board and changed all that. Arise has seen members come and go, usually to see them start there own warez group. Hehe, I see more warez groups that have former Arise members and it amazes me, and I wish them all the BesT. Some say now we’re the best, the only true 0day group left. Well that is a nice complement. Ya know nothing lasts forever, but while its happening I say 0-Day Everyday!!
-Evil, Founder Of Arise

Netcat 1.10

Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....
Hacker defender v0.7.3

Hacker defender v0.7.3====================== Main---- Hacker defender v0.7.3 byHoly_Father <holy_father@phreaker.net> & Ratter/29A <ratter@atlas.cz>Copyright (c) 2000,forever ExEwORxbirthday: 10.01.2003home: http://rootkit.host.skBetatesters:ch0pper <THEMASKDEMON@flashmail.com>phj34r (sandstorm99@ziplip.com)ierdna (ierdna@go.ro)UnixDied Hacker defender is rootkit for Windows NT 4.0, Windows 2000 and Windows XP.Main code was written in Delphi 6. New functions are written in assembler.Backdoor and redirector clients are coded mostly in Delphi 6. program uses adapted LDE32LDE32, Length-Disassembler Engine, 32-bit, (x) 1999-2000 Z0MBiEspecial edition.....
Thanks
Thanks
Anyone that submits anything to AOLForever I will give them a shout out on this page. It's hard finding content for this site so anyone that has anything related to the AOL/AIM Scene please send it to (justinakapaste@gmail.com) and I will add you to this page be sure to include your handle in the e-mail. Thanks to Spyer2000 / Bobby for submitting over 200 AOL.....